Essays about: "Conclusion of oPEN SOURCE"

Showing result 11 - 15 of 107 essays containing the words Conclusion of oPEN SOURCE.

  1. 11. Region-based analysis of magnetic resonance brain images: integrating statistical analysis and visualization

    University essay from

    Author : Yu-Ping Hsu; [2022-04-05]
    Keywords : Medical physics; Neuroimage; Brain segmentation; Statistical analysis; Visualization;

    Abstract : Purpose: The purpose of the project was to develop a processing toolchain that takes MR brain images and their anatomical segmentations as input and produces image visualizations, data visualizations, and statistical analyses in a unified manner for the users who work with neuroimaging and quantitative brain anatomy, including pathological anatomy. A secondary aim was to package and release the software publicly as open source. READ MORE

  2. 12. Analysing methods for visualizing time-series datasets in open-source web mapping

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Viggo Lunde; [2022]
    Keywords : Geography; GIS; spatio-temporal; time-series open source; webmap; Earth and Environmental Sciences;

    Abstract : Geography is the study of knowledge in a given location, and history is the study of knowledge over time. The combination of changes over time has always been challenging to visualize in maps. READ MORE

  3. 13. Building IoT Systems On Public Cloud Platforms Using Commercial And Open Source IoT Technologies

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johan Larsson; [2022]
    Keywords : ;

    Abstract : The expansion of uniquely identifiable devices that can report their environment through the internet has beenrapid. The Internet of Things(IoT) is the next step in interconnectivity between humans and devices. READ MORE

  4. 14. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  5. 15. Analysis, Implementation and Evaluation of Direction Finding Algorithms using GPU Computing

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Regina Andersdotter; [2022]
    Keywords : GPU; GPU Computing; Direction Finding; GPU Suitability; CUDA; Multiple Signal Classification; Weighted Subspace Fitting; Correlative Interferometer; runtime; angle resolution; block size;

    Abstract : Direction Finding (DF) algorithms are used by the Swedish Defence Research Agency (FOI) in the context of electronic warfare against radio. Parallelizing these algorithms using a Graphics Processing Unit (GPU) might improve performance, and thereby increase military support capabilities. READ MORE